62,277 Hits in 5.4 sec

Better Under-Approximation of Programs by Hiding Variables [chapter]

Thomas Ball, Orna Kupferman
Lecture Notes in Computer Science  
On the negative side, the universal nature of under-approximating transitions makes them dependent on all the variables of the program.  ...  The abstraction, on the other hand, often hides some of the variables.  ...  Hiding the variable t, however, we can prove the above by showing that pmust − {x,y,pc} (a, a).  ... 
doi:10.1007/978-3-540-69738-1_23 dblp:conf/vmcai/BallK07 fatcat:vydmqazxarbfvf53azabgzua2q

Selfish Knapsack

Itai Feigenbaum, Matthew Johnson
We consider a strategic variant of the knapsack problem: the items are owned by agents, and agents can misrepresent their sets of items---either by hiding items (understating), or by reporting fake ones  ...  For the case of two understating-only agents, we provide a specialized randomized strategyproof 1.522-approximate mechanism, and a lower bound of 1.09.  ...  Acknowledgements This work was supported in part by CUNY Collaborative Incentive Research Grant (CIRG 21) 2153 and PSC-CUNY Research Award 67665-00 45.  ... 
doi:10.1609/aaai.v31i1.10579 fatcat:nkh5up3rwfhifpktjigzhk4hoa

Towards alias-free pointers [chapter]

Naftaly H. Minsky
1996 Lecture Notes in Computer Science  
This paper argues that pointer-induced aliasing can be avoided in many cases by means of a concept of unique pointer.  ...  The use of such pointers is expected to fortify the concept of encapsulation, to make systems easier to reason about, to provide better control over the interaction between threads, and to make storage  ...  Acknowledgment: I would like to thank Alex Borgida, Rock Howard, Yaron Minsky, Partha Pal and Yossi Stein for many useful conversation during the writing of this paper.  ... 
doi:10.1007/bfb0053062 fatcat:655thqdqanfifanvmg2xtj4gfm

Hybrid cegar: combining variable hiding and predicate abstraction

Chao Wang, Hyondeuk Kim, Aarti Gupta
2007 Computer-Aided Design (ICCAD), IEEE International Conference on  
Variable hiding and predicate abstraction are two popular abstraction methods to obtain simplified models for model checking.  ...  Our experiments on public benchmarks show that the new abstraction method frequently outperforms the better of the two existing abstraction methods.  ...  Variable hiding marks a subset Xv = {x1, . . . , xn} ⊆ X of state variables as visible. The set of remaining variables (called invisible variables) is denoted by Xinv = (X \Xv ).  ... 
doi:10.1109/iccad.2007.4397283 dblp:conf/iccad/WangKG07 fatcat:d4eqcgiobzgbjcwuku7fdpa5hu

VMM-based hidden process detection and identification using Lycosid

Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
2008 Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments - VEE '08  
Use of stealth rootkit techniques to hide long-lived malicious processes is a current and alarming security issue.  ...  This research is sponsored by the Sandia National Laboratories Doctoral Studies Program, by NSF CCR-0133456, ITR-0325267, CNS-0509474, and by generous donations from Network Appliance and EMC.  ...  CPU inflation works by transparently placing patches in guest program code.  ... 
doi:10.1145/1346256.1346269 dblp:conf/vee/JonesAA08 fatcat:3igcjjy6r5dcljjxxlvd624nwi

Static Analysis to Model & Measure OO Paradigms

Satwinder Singh, K.S. Kahlon
2010 International Journal of Computer Applications  
In this work we tried to refine metrics especially for object-oriented programming and set of these metrics has been defined.  ...  Field of reverse engineering is expanding its horizon day by day; it requires reusability not only at code level but also at higher level which can measure the analysis results and original system.  ...  This model help in better understanding of source program by presenting the code file in simple text mode and analyse it with the help of metrics.  ... 
doi:10.5120/226-377 fatcat:xms4qw2u5fdmjam7ur3xolzr2e

Page 6448 of Mathematical Reviews Vol. , Issue 2003h [page]

2003 Mathematical Reviews  
Similarly, a basis consis- tent with the introduction of a self-similar variable for the infinite domain problems (boundary value problems) can be reproduced by the quasi-steady approximation by selecting  ...  Hide found that the (3,3) system obtained by including the motor but in the absence of eddy currents, does not have any oscillatory so- lutions.  ... 

Mathematical Tools of Soft Computing

Ker-Wei Yu, Yang Xu, Jer-Guang Hsieh
2014 Mathematical Problems in Engineering  
The adaptive memory programming is adopted in this study to enhance the performance of classic EDA by deriving a better approximation for the true distribution of the target solutions.  ...  and optimization of software programs based on symbolic-numeric computation" by H.  ...  The hard work of all reviewers is greatly acknowledged. Without them, this special issue can never become possible. Ker-Wei Yu Yang Xu Jer-Guang Hsieh  ... 
doi:10.1155/2014/904014 fatcat:gs4ugjintbf5xopjwjq34tx5sq

Automatic Optimization of Thread Mapping for a GPGPU Programming Framework

Kazuhiko Ohno, Tomoharu Kamiya, Takanori Maruyama, Masaki Matsumoto
2015 International Journal of Networking and Computing  
As the result of evaluation, our scheme could find optimal mapping strategies for five benchmark programs.  ...  Based on a virtual shared memory model, MESI-CUDA hides low-level memory management and data transfer from the user.  ...  Acknowledgment This work was supported by JSPS KAKENHI Grant Number 24500060.  ... 
doi:10.15803/ijnc.5.2_253 fatcat:4jjyuow3evhhjff3fjfrqivceu

Automatic Optimization of Thread Mapping for a GPGPU Programming Framework

Kazuhiko Ohno, Tomoharu Kamiya, Takanori Maruyama, Masaki Matsumoto
2014 2014 Second International Symposium on Computing and Networking  
As the result of evaluation, our scheme could find optimal mapping strategies for five benchmark programs.  ...  Based on a virtual shared memory model, MESI-CUDA hides low-level memory management and data transfer from the user.  ...  Acknowledgment This work was supported by JSPS KAKENHI Grant Number 24500060.  ... 
doi:10.1109/candar.2014.104 dblp:conf/ic-nc/OhnoKMM14 fatcat:7dnjlez3evh27kwoi3ca6y67oi

A steganography strategy based on equivalence partitions of hiding units

Shaohui Liu, Hongxun Yao, Shengping Zhang, Wen Gao
2010 2010 IEEE International Conference on Multimedia and Expo  
Because of considering the relation between the length of message and capacity, the performance of the hiding method using proposed hiding strategy outperforms the original approaches when embedding the  ...  According to a constructed equivalence relation based on the capacity of hiding units, all hiding units can be partitioned into equivalence classes.  ...  60803147), the New Teacher Program Foundation (200802131023) and Major State Basic Research Development Program of China (973 Program) (2009CB320906).  ... 
doi:10.1109/icme.2010.5583275 dblp:conf/icmcs/LiuYZG10 fatcat:u7vf6ck5dvgy3pz2hcknmhhg44

A Graph Theoretic Approach to Software Watermarking [chapter]

Ramarathnam Venkatesan, Vijay Vazirani, Saurabh Sinha
2001 Lecture Notes in Computer Science  
Under some natural assumptions about the code added to embed the WM, locating the WM by an attacker is related to some graph approximation problems.  ...  Since little theoretical foundation exists for hardness of typical instances of graph approximation problems, we present heuristics to generate such hard instances and, in a limited case, present a heuristic  ...  Thus this step gives us one sample (N c ) for a random variable that under the hypothsis has an expectation of E(X c ) = N p c .  ... 
doi:10.1007/3-540-45496-9_12 fatcat:qflfbaaatraz5o2vjfc5pv5bb4

Nonsmooth trajectory optimization - An approach using continuous simulated annealing

Ping Lu, M. A. Khan
1994 Journal of Guidance Control and Dynamics  
Again, Hide- and-Seek consistently obtained solutions better than those found by Principal Axis and Nelder-Mead Simplex. Improvements ranged from 19.4 to 44.8%.  ...  Acknowledgments This work was supported in part by NASA Langley Research Center under grant NAG-1-1255.  ... 
doi:10.2514/3.21256 fatcat:nlhb3hxzfjeefog7h4d2gt3gtm

Microbiological Testing for the Proper Assessment of the Hygiene Status of Beef Carcasses

Anderson Camargo, Marcus Cossi, Wladimir Silva, Luciano Bersot, Mariza Landgraf, József Baranyi, Bernadette Franco, Nero Luís Augusto
2019 Microorganisms  
The proposed model can be used as a valuable tool for the design and adoption of feasible quality control programs in beef industries.  ...  In this study, the hygiene status of beef carcasses sampled in eight Brazilian slaughterhouses was assessed by enumeration of different hygiene indicator microorganisms, and a model to establish potential  ...  The source of error is the inherent variability of the system, shown by the results of replicated measurements.  ... 
doi:10.3390/microorganisms7030086 pmid:30893864 pmcid:PMC6462900 fatcat:vcjeh4q6kvcs3m7vponfty6k2e

Sustainability assessment of land transactions and project benefits sharing in Papua New Guinea

I. Papa Imen, A. Babarinde Jacob
2021 Journal of Land Management and Appraisal  
There is an increasing concern that land transactions in Papua New Guinea are perceived by some landowners and key government officials as unsustainable due to inequitable sharing of benefits among the  ...  The paper, therefore, calls for government intervention to streamline national land transactions for consistency and sustainability under a common national land policy.  ...  of 0.01 between the two variables.  ... 
doi:10.5897/jlma2021.0022 fatcat:wmg6vaas3vbmroua4vw76dmtii
« Previous Showing results 1 — 15 out of 62,277 results